{"id":83671,"date":"2018-06-14T08:00:35","date_gmt":"2018-06-14T15:00:35","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=83671"},"modified":"2023-05-26T14:45:26","modified_gmt":"2023-05-26T21:45:26","slug":"building-zero-trust-networks-with-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/06\/14\/building-zero-trust-networks-with-microsoft-365\/","title":{"rendered":"Building Zero Trust networks with Microsoft 365"},"content":{"rendered":"

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, today\u2019s increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional defenses are vulnerable to breaches: an attacker can compromise a single endpoint within the trusted boundary and then quickly expand foothold across the entire network.<\/p>\n

Zero Trust networks eliminate the concept of trust based on network location within a perimeter. Instead, Zero Trust architectures leverage device and user trust claims to gate access to organizational data and resources. A general Zero Trust network model (Figure 1) typically comprises the following:<\/p>\n